SlideShare ist ein Scribd-Unternehmen logo
1 von 35
A quick ‘n easy intro to LKIF Core Rinke Hoekstra
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LKIF-Core ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Principled Design ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Middle-out Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object]
LKIF-Core Scores ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LKIF-Core Modules (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top level ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mereology (1): Concepts
Mereology (2): Relations
Time (1): Concepts ,[object Object]
Time (2): Relations
Place (1): Concepts ,[object Object]
Place (2): Relations
Process (1): Concepts
Process (2): Relations
Basic level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Action (1): Agent
Action (2): Action
Role (1): Three types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role (2): Overview
Expression (1): Proposition and Medium ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Expression (2): PA’s and Qualifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Expression (3): Epistemic Roles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Expression (4): Relations
Legal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Norm (1): Norms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Norm (2): Normatively Qualified
Norm (3): Legal Sources
Legal Action
Frameworks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Modification
Rules (& Epistemic Roles)
Problematic Things ,[object Object],[object Object],[object Object],[object Object]
TODO’s & Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Ähnlich wie Leibniz Meeting 20070405

Prior to beginning work on this discussion read Hill (2013) Partner.docx
Prior to beginning work on this discussion read Hill (2013) Partner.docxPrior to beginning work on this discussion read Hill (2013) Partner.docx
Prior to beginning work on this discussion read Hill (2013) Partner.docx
keilenettie
 
Prior to beginning work on this discussion read Hill (2013) Partn.docx
Prior to beginning work on this discussion read Hill (2013) Partn.docxPrior to beginning work on this discussion read Hill (2013) Partn.docx
Prior to beginning work on this discussion read Hill (2013) Partn.docx
arleanemlerpj
 
I need about 120 words for each question and prefer to have each que.docx
I need about 120 words for each question and prefer to have each que.docxI need about 120 words for each question and prefer to have each que.docx
I need about 120 words for each question and prefer to have each que.docx
florriezhamphrey3065
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
jakeomoore75037
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
lauricesatu
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
alanrgibson41217
 
Norms in Multi Agent Systems
Norms in Multi Agent SystemsNorms in Multi Agent Systems
Norms in Multi Agent Systems
harrikipper
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
mattjtoni51554
 
Planning, Negotiating & Implementation Assignment
Planning, Negotiating & Implementation Assignment                 Planning, Negotiating & Implementation Assignment
Planning, Negotiating & Implementation Assignment
dessiechisomjj4
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
jeanettehully
 
13 Leadership EthicsDescriptionThis chapter is different from .docx
13 Leadership EthicsDescriptionThis chapter is different from .docx13 Leadership EthicsDescriptionThis chapter is different from .docx
13 Leadership EthicsDescriptionThis chapter is different from .docx
drennanmicah
 
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docxSTEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
whitneyleman54422
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
gasciognecaren
 
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docxRUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
toddr4
 

Ähnlich wie Leibniz Meeting 20070405 (20)

Prior to beginning work on this discussion read Hill (2013) Partner.docx
Prior to beginning work on this discussion read Hill (2013) Partner.docxPrior to beginning work on this discussion read Hill (2013) Partner.docx
Prior to beginning work on this discussion read Hill (2013) Partner.docx
 
Prior to beginning work on this discussion read Hill (2013) Partn.docx
Prior to beginning work on this discussion read Hill (2013) Partn.docxPrior to beginning work on this discussion read Hill (2013) Partn.docx
Prior to beginning work on this discussion read Hill (2013) Partn.docx
 
I need about 120 words for each question and prefer to have each que.docx
I need about 120 words for each question and prefer to have each que.docxI need about 120 words for each question and prefer to have each que.docx
I need about 120 words for each question and prefer to have each que.docx
 
Introduction to Legal Research Methodology
Introduction to Legal Research MethodologyIntroduction to Legal Research Methodology
Introduction to Legal Research Methodology
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
 
Norms in Multi Agent Systems
Norms in Multi Agent SystemsNorms in Multi Agent Systems
Norms in Multi Agent Systems
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
 
Planning, Negotiating & Implementation Assignment
Planning, Negotiating & Implementation Assignment                 Planning, Negotiating & Implementation Assignment
Planning, Negotiating & Implementation Assignment
 
Karl N. Llewellyn 0503 Intro
Karl N. Llewellyn 0503 IntroKarl N. Llewellyn 0503 Intro
Karl N. Llewellyn 0503 Intro
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Indept fgd kelembagaan bbptp (yuti)
Indept fgd kelembagaan   bbptp (yuti)Indept fgd kelembagaan   bbptp (yuti)
Indept fgd kelembagaan bbptp (yuti)
 
13 Leadership EthicsDescriptionThis chapter is different from .docx
13 Leadership EthicsDescriptionThis chapter is different from .docx13 Leadership EthicsDescriptionThis chapter is different from .docx
13 Leadership EthicsDescriptionThis chapter is different from .docx
 
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docxSTEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
STEPS OF THE ETHICAL STEPS OF THE ETHICAL DECISIONDECISION--.docx
 
Overview In this you will look at Wheel.docx
Overview In this you will look at Wheel.docxOverview In this you will look at Wheel.docx
Overview In this you will look at Wheel.docx
 
Forms of discourse analysis
Forms of discourse analysisForms of discourse analysis
Forms of discourse analysis
 
Data Model vs Ontology Development – a FIBO perspective | Mike Bennett
Data Model vs Ontology Development – a FIBO perspective | Mike BennettData Model vs Ontology Development – a FIBO perspective | Mike Bennett
Data Model vs Ontology Development – a FIBO perspective | Mike Bennett
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
 
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docxRUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
RUBRICAll Major Elements Included 1.Clear & Limiting Title (tel.docx
 

Mehr von Rinke Hoekstra

Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Rinke Hoekstra
 
Linked (Open) Data - But what does it buy me?
Linked (Open) Data - But what does it buy me?Linked (Open) Data - But what does it buy me?
Linked (Open) Data - But what does it buy me?
Rinke Hoekstra
 
Linked Science - Building a Web of Research Data
Linked Science - Building a Web of Research DataLinked Science - Building a Web of Research Data
Linked Science - Building a Web of Research Data
Rinke Hoekstra
 
Semantic Representations for Research
Semantic Representations for ResearchSemantic Representations for Research
Semantic Representations for Research
Rinke Hoekstra
 
SIKS 2011 Semantic Web Languages
SIKS 2011 Semantic Web LanguagesSIKS 2011 Semantic Web Languages
SIKS 2011 Semantic Web Languages
Rinke Hoekstra
 
The MetaLex Document Server - Legal Documents as Versioned Linked Data
The MetaLex Document Server - Legal Documents as Versioned Linked DataThe MetaLex Document Server - Legal Documents as Versioned Linked Data
The MetaLex Document Server - Legal Documents as Versioned Linked Data
Rinke Hoekstra
 

Mehr von Rinke Hoekstra (20)

Knowledge Representation on the Web
Knowledge Representation on the WebKnowledge Representation on the Web
Knowledge Representation on the Web
 
Managing Metadata for Science and Technology Studies: the RISIS case
Managing Metadata for Science and Technology Studies: the RISIS caseManaging Metadata for Science and Technology Studies: the RISIS case
Managing Metadata for Science and Technology Studies: the RISIS case
 
An Ecosystem for Linked Humanities Data
An Ecosystem for Linked Humanities DataAn Ecosystem for Linked Humanities Data
An Ecosystem for Linked Humanities Data
 
QBer - Connect your data to the cloud
QBer - Connect your data to the cloudQBer - Connect your data to the cloud
QBer - Connect your data to the cloud
 
Jurix 2014 welcome presentation
Jurix 2014 welcome presentationJurix 2014 welcome presentation
Jurix 2014 welcome presentation
 
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
Provenance and Reuse of Open Data (PILOD 2.0 June 2014)
 
Prov-O-Viz: Interactive Provenance Visualization
Prov-O-Viz: Interactive Provenance VisualizationProv-O-Viz: Interactive Provenance Visualization
Prov-O-Viz: Interactive Provenance Visualization
 
Linkitup: Link Discovery for Research Data
Linkitup: Link Discovery for Research DataLinkitup: Link Discovery for Research Data
Linkitup: Link Discovery for Research Data
 
A Network Analysis of Dutch Regulations - Using the Metalex Document Server
A Network Analysis of Dutch Regulations - Using the Metalex Document ServerA Network Analysis of Dutch Regulations - Using the Metalex Document Server
A Network Analysis of Dutch Regulations - Using the Metalex Document Server
 
Linked (Open) Data - But what does it buy me?
Linked (Open) Data - But what does it buy me?Linked (Open) Data - But what does it buy me?
Linked (Open) Data - But what does it buy me?
 
Linked Science - Building a Web of Research Data
Linked Science - Building a Web of Research DataLinked Science - Building a Web of Research Data
Linked Science - Building a Web of Research Data
 
COMMIT/VIVO
COMMIT/VIVOCOMMIT/VIVO
COMMIT/VIVO
 
Semantic Representations for Research
Semantic Representations for ResearchSemantic Representations for Research
Semantic Representations for Research
 
A Slightly Different Web of Data
A Slightly Different Web of DataA Slightly Different Web of Data
A Slightly Different Web of Data
 
The Knowledge Reengineering Bottleneck
The Knowledge Reengineering BottleneckThe Knowledge Reengineering Bottleneck
The Knowledge Reengineering Bottleneck
 
Linked Census Data
Linked Census DataLinked Census Data
Linked Census Data
 
Concept- en Definitie Extractie
Concept- en Definitie ExtractieConcept- en Definitie Extractie
Concept- en Definitie Extractie
 
SIKS 2011 Semantic Web Languages
SIKS 2011 Semantic Web LanguagesSIKS 2011 Semantic Web Languages
SIKS 2011 Semantic Web Languages
 
The MetaLex Document Server - Legal Documents as Versioned Linked Data
The MetaLex Document Server - Legal Documents as Versioned Linked DataThe MetaLex Document Server - Legal Documents as Versioned Linked Data
The MetaLex Document Server - Legal Documents as Versioned Linked Data
 
Querying the Web of Data
Querying the Web of DataQuerying the Web of Data
Querying the Web of Data
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Leibniz Meeting 20070405